Select Publications
Journal articles
2024, 'MetaVRadar: Measuring Metaverse Virtual Reality Network Activity', Performance Evaluation Review, 52, pp. 11 - 12, http://dx.doi.org/10.1145/3673660.3655065
,2024, 'A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection', IEEE Access, 12, pp. 89363 - 89383, http://dx.doi.org/10.1109/ACCESS.2024.3419068
,2023, 'MetaVRadar: Measuring Metaverse Virtual Reality Network Activity', Proceedings of the ACM on Measurement and Analysis of Computing Systems, 7, http://dx.doi.org/10.1145/3626786
,2023, 'Enterprise DNS Asset Mapping and Cyber-Health Tracking via Passive Traffic Analysis', IEEE Transactions on Network and Service Management, 20, pp. 3699 - 3716, http://dx.doi.org/10.1109/TNSM.2022.3221981
,2023, 'PEDDA: Practical and Effective Detection of Distributed Attacks on enterprise networks via progressive multi-stage inference', Computer Networks, 233, http://dx.doi.org/10.1016/j.comnet.2023.109873
,2023, 'A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques', ACM Computing Surveys, 55, http://dx.doi.org/10.1145/3547331
,2022, 'Classifying and tracking enterprise assets via dual-grained network behavioral analysis', Computer Networks, 218, http://dx.doi.org/10.1016/j.comnet.2022.109387
,2022, 'Combining Device Behavioral Models and Building Schema for Cybersecurity of Large-Scale IoT Infrastructure', IEEE Internet of Things Journal, 9, pp. 24174 - 24185, http://dx.doi.org/10.1109/JIOT.2022.3189350
,2022, 'Estimating Passenger Queue for Bus Resource Optimization Using LoRaWAN-Enabled Ultrasonic Sensors', IEEE Systems Journal, 16, pp. 6265 - 6276, http://dx.doi.org/10.1109/JSYST.2022.3159577
,2022, 'Understanding and Reducing HVAC Power Consumption Post-Evacuation Events in Commercial Buildings', IEEE Internet of Things Journal, 9, pp. 17235 - 17248, http://dx.doi.org/10.1109/JIOT.2022.3152138
,2022, 'Modeling Classroom Occupancy Using Data of WiFi Infrastructure in a University Campus', IEEE Sensors Journal, 22, pp. 9981 - 9996, http://dx.doi.org/10.1109/JSEN.2022.3165138
,2022, 'Monetizing Parking IoT Data via Demand Prediction and Optimal Space Sharing', IEEE Internet of Things Journal, 9, pp. 5629 - 5644, http://dx.doi.org/10.1109/JIOT.2020.3044900
,2022, 'Automatic Detection of DGA-Enabled Malware Using SDN and Traffic Behavioral Modeling', IEEE Transactions on Network Science and Engineering, 9, pp. 2922 - 2939, http://dx.doi.org/10.1109/TNSE.2022.3173591
,2022, 'Verifying and Monitoring IoTs Network Behavior Using MUD Profiles', IEEE Transactions on Dependable and Secure Computing, 19, pp. 1 - 18, http://dx.doi.org/10.1109/TDSC.2020.2997898
,2021, 'Optimal Witnessing of Healthcare IoT Data Using Blockchain Logging Contract', IEEE Internet of Things Journal, 8, pp. 10117 - 10130, http://dx.doi.org/10.1109/JIOT.2021.3051433
,2021, 'Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks', IEEE Transactions on Network and Service Management, 18, pp. 1031 - 1048, http://dx.doi.org/10.1109/TNSM.2021.3050091
,2021, 'Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices', IEEE Transactions on Dependable and Secure Computing, 18, pp. 753 - 764, http://dx.doi.org/10.1109/TDSC.2019.2927674
,2020, 'Forensic Verification of Health Data from Wearable Devices Using Anonymous Witnesses', IEEE Internet of Things Journal, 7, pp. 10745 - 10762, http://dx.doi.org/10.1109/JIOT.2020.2982958
,2020, 'Detecting Behavioral Change of IoT Devices Using Clustering-Based Network Traffic Modeling', IEEE Internet of Things Journal, 7, pp. 7295 - 7309, http://dx.doi.org/10.1109/JIOT.2020.2984030
,2020, 'Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning', IEEE Transactions on Network and Service Management, 17, pp. 60 - 74, http://dx.doi.org/10.1109/TNSM.2020.2971213
,2019, 'Enhancing Security Management at Software-Defined Exchange Points', IEEE Transactions on Network and Service Management, 16, pp. 1479 - 1492, http://dx.doi.org/10.1109/TNSM.2019.2944368
,2019, 'Experiences with IoT and AI in a Smart Campus for Optimizing Classroom Usage', IEEE Internet of Things Journal, 6, pp. 7595 - 7607, http://dx.doi.org/10.1109/JIOT.2019.2902410
,2019, 'iTeleScope: Softwarized Network Middle-Box for Real-Time Video Telemetry and Classification', IEEE Transactions on Network and Service Management, 16, pp. 1071 - 1085, http://dx.doi.org/10.1109/TNSM.2019.2929511
,2019, 'Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics', IEEE Transactions on Mobile Computing, 18, pp. 1745 - 1759, http://dx.doi.org/10.1109/TMC.2018.2866249
,2019, 'Network-level security for the internet of things: Opportunities and challenges', Computer, 52, pp. 58 - 62, http://dx.doi.org/10.1109/MC.2019.2917972
,2019, 'Monitoring Enterprise DNS Queries for Detecting Data Exfiltration from Internal Hosts', IEEE Transactions on Network and Service Management, 17, http://dx.doi.org/10.1109/TNSM.2019.2940735
,2018, 'Responsive high throughput congestion control for interactive applications over SDN-enabled networks', Computer Networks, 134, pp. 152 - 166, http://dx.doi.org/10.1016/j.comnet.2018.01.043
,2018, 'Smart IoT devices in the home: Security and Privacy Implications', IEEE Technology and Society Magazine, 37, pp. 71 - 79, http://dx.doi.org/10.1109/MTS.2018.2826079
,2017, 'Enabling fast and slow lanes for content providers using software defined networking', IEEE/ACM Transactions on Networking, 25, pp. 1373 - 1385, http://dx.doi.org/10.1109/TNET.2016.2627005
,2017, 'HazeEst: Machine Learning Based Metropolitan Air Pollution Estimation from Fixed and Mobile Sensors', IEEE Sensors Journal, 17, pp. 3517 - 3525, http://dx.doi.org/10.1109/JSEN.2017.2690975
,2016, 'Greening Router Line-Cards via Dynamic Management of Packet Memory', IEEE Journal on Selected Areas in Communications, 34, pp. 3843 - 3853, http://dx.doi.org/10.1109/JSAC.2016.2600412
,2016, 'SDN APIs and Models for Two-Sided Resource Management in Broadband Access Networks', IEEE Transactions on Network and Service Management, 13, pp. 823 - 834, http://dx.doi.org/10.1109/TNSM.2016.2615067
,2016, 'An economic model for a new broadband ecosystem based on fast and slow lanes', IEEE Network, 30, pp. 26 - 31, http://dx.doi.org/10.1109/MNET.2016.7437021
,2016, 'Perspectives on net neutrality and Internet fast-lanes', Computer Communication Review, 46, pp. 64 - 69, http://dx.doi.org/10.1145/2875951.2875962
,2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391
,2015, 'Greening residential Wi-Fi networks under centralized control', IEEE Transactions on Mobile Computing, 14, pp. 552 - 564, http://dx.doi.org/10.1109/TMC.2014.2324582
,2015, 'Comparing edge and host traffic pacing in small buffer networks', Computer Networks, 77, pp. 103 - 116, http://dx.doi.org/10.1016/j.comnet.2014.11.021
,2015, 'Bringing cohort studies to the bedside: framework for a ‘green button’to support clinical decision-making', Journal of comparative effectiveness research, 4, pp. 191 - 197
,2015, 'Design and evaluation of a metropolitan air pollution sensing system', IEEE Sensors Journal, 16, pp. 1448 - 1459
,2015, 'It’s only the beginning: Metadata Retention laws and the Internet of Things', Australian Journal of Telecommunications and the Digital Economy, 3, pp. 47 - 57, http://dx.doi.org/10.18080/ajtde.v3n3.21
,2014, 'Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices', IEEE Transactions on Mobile Computing, 13, pp. 2763 - 2776, http://dx.doi.org/10.1109/TMC.2013.71
,2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998
,2014, 'An experimental power profile of Energy Efficient Ethernet switches', Computer Communications, 50, pp. 110 - 118, http://dx.doi.org/10.1016/j.comcom.2014.02.019
,2014, 'Comparison of the energy, carbon and time costs of videoconferencing and in-person meetings', Computer Communications, 50, pp. 86 - 94, http://dx.doi.org/10.1016/j.comcom.2014.02.009
,2014, 'Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring', Future Generation Computer Systems, 35, pp. 80 - 90, http://dx.doi.org/10.1016/j.future.2013.09.007
,2013, 'PET Protection optimization for streaming scalable videos with multiple transmissions', IEEE Transactions on Image Processing, 22, pp. 4364 - 4379, http://dx.doi.org/10.1109/TIP.2013.2272516
,2013, 'An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring', Ad Hoc Networks, 11, pp. 798 - 817, http://dx.doi.org/10.1016/j.adhoc.2012.09.005
,2013, 'DEMO abstract: Securing data provenance in body area networks using lightweight wireless link fingerprints', SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517432
,2013, 'Enabling a bufferless core optical network using edge-to-edge packet-level FEC', IEEE Transactions on Communications, 61, pp. 690 - 699, http://dx.doi.org/10.1109/TCOMM.2012.022513.110788
,2012, 'Architecting a national optical fiber open-access network: The Australian Challenge', IEEE Network, 26, pp. 4 - 10, http://dx.doi.org/10.1109/MNET.2012.6246746
,